Security

  • E-Sim cards are coming, whether the operators want them or not

    Embedded SIM cards hold lots of potential. The operators may not favor them, but they may not have a choice.

    Read Article
  • Back to the Future with the Millennium Bug

    Everyone over 30 or so can remember the “Y2K problem,” also known as the “Millennium bug.” As the end of the century and millennium loomed, there was widespread concern that chaos would ensue.

    Read Article
  • How Hollywood gets biometrics wrong (and what it gets right)

    Setting aside the question of whether rogue robots will create a dystopian future, there is one area that artificial intelligence (AI) in movies all s...

    Read Article
  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    The risks of incorporating 3rd-party code & best practices for securing it.

    Download PDF
  • 4 trends to watch in the IoT market now

    2017 is shaping up to be a significant and disruptive year for the development of the Internet of Things (IoT), for both technology players and the in...

    Read Article
  • Device management 101: IoT and its major issues

    As Internet of Things (IoT) networks and associated "things" become more complex, major issues - data issues, communication issues, device monitoring...

    Read Article
  • Manage and update your vehicle fleet remotely and (more importantly) securely

    If I had to pick one technology that got more than its share of attention at CES, it would be automotive. The products and technologies that were on d...

    Read Article
  • Securing a factory's OT network and the role of trust

    Securing a factory's OT network and the role of trust

    When leaders have advanced knowledge of how and where their cyber defenses will be attacked, they mobilize resources to reinforce the targeted area. T...

    Read Article
  • Revisiting your software development process? Do the right thing.

    Revisiting your software development process? Do the right thing.

    A while ago, I spoke to a client's tech lead about why the company was making changes to their software development process. I'm always curious to hea...

    Read Article
  • Assigning an ID to 'things' with secure SD cards

    Assigning an ID to 'things' with secure SD cards

    IT security professionals know that identification, authentication and authorization are the three steps to access a "secure channel". Clear identific...

    Read Article
  • Access any IoT "thing" anywhere with MQTT

    Access any IoT "thing" anywhere with MQTT

    Analysts forecast that up to 50 billion devices could be part of the Internet of Things (IoT) by 2020. This presents a challenge for engineers develop...

    Read Article
  • embedded world 2017: Security and the software-defined Internet of Things

    As we look forward to Embedded World 2017, it's hard not to notice how far the Internet of Things (IoT) has come since last year's show, and how deepl...

    Read Article
  • Testing is the only way to assure that code is correct

    Testing is the only way to assure that code is correct

    As systems in industrial, automotive, medical, and energy markets that involve human life and limb are connected to the IoT, the stakes get higher and...

    Read Article
  • The Internet of Dangerous Things

    The Internet of Dangerous Things

    From automotive and avionics to medical devices and consumer electronics, more safety-critical applications using embedded systems are coming online e...

    Read Article
  • Safety-critical software development surprisingly short on standards, analysis, and review

    Safety-critical software development surprisingly short on standards, analysis, and review

    Recent survey data indicates that static code analysis, peer review, and basic coding standards are being neglected in the development of safety-criti...

    Read Article
  • Make your device unattractive to hackers: Design in security early on

    Make your device unattractive to hackers: Design in security early on

    Stuxnet. Black Hat insulin pump hack. Jeeps driving off the side of the road. Mirai botnet malware. It used to be difficult to argue that embedded dev...

    Read Article
  • Ensuring a safe medical design

    Ensuring a safe medical design

    Until recently, developers and manufacturers of medical devices have not been required to consider security in their products. New guidance from the U...

    Read Article
  • Standards and security-aware design for connected devices

    Standards and security-aware design for connected devices

    In Internet of Things (IoT) devices, security is often viewed as the purview of a specialized person or team in the development process, but the respo...

    Read Article
  • Get to higher ground with embedded firmware security training

    Imagine it's late Thursday afternoon. Your team needs to reverse engineer the embedded firmware on one of your new devices to search for security hole...

    Read Article
  • AWS, Microchip create a more secure connection to the cloud

    AWS, Microchip create a more secure connection to the cloud

    The rise of the Internet of Things (IoT) has created a new set of security considerations for the cloud. Now not only do you need to safeguard the dat...

    Read Article
  • loading
    Loading More...